C:\vmagent_new\bin\joblist\774480\out\Release\drv_uninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84687b1047d3c9a0b0de11a64391173e170aa75f86eaf106887cd6c52c580763.exe
Resource
win7-20240704-en
General
-
Target
84687b1047d3c9a0b0de11a64391173e170aa75f86eaf106887cd6c52c580763
-
Size
780KB
-
MD5
74856a79eee104c1836c73a8c42a9940
-
SHA1
bd819f5a51f29dc6b5c72d9c3503e5301642e80d
-
SHA256
84687b1047d3c9a0b0de11a64391173e170aa75f86eaf106887cd6c52c580763
-
SHA512
4b10617929f02b8f26321b2ce8f62ff6d8b33720179882346d7dbae370fbe6c401b3da8cc69732ae92a47a75342ab799bb982db953c480c5807d0d0377b944cc
-
SSDEEP
12288:2JP+V651HwXiMBxOdkOtauXHWm4sY3HWm4IgD8p:6PkoHwXPBx2t3XHJ4747Da
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84687b1047d3c9a0b0de11a64391173e170aa75f86eaf106887cd6c52c580763
Files
-
84687b1047d3c9a0b0de11a64391173e170aa75f86eaf106887cd6c52c580763.exe windows:5 windows x86 arch:x86
bef44cf82d181529319d9fdfeed93a09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadContext
VirtualQuery
SetThreadPriority
VirtualAlloc
OpenThread
GetThreadPriority
SuspendThread
ResumeThread
ReadFile
GetFileSizeEx
RemoveDirectoryW
GetPrivateProfileStringW
VirtualProtect
GetCurrentThread
GetLocalTime
WaitForMultipleObjects
ExitProcess
CreateToolhelp32Snapshot
OpenProcess
GetSystemInfo
GlobalMemoryStatusEx
lstrcmpiA
lstrcmpA
MultiByteToWideChar
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
CopyFileW
GetSystemDirectoryW
GetTickCount
RaiseException
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FindClose
FindNextFileW
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetModuleHandleA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoA
SetHandleCount
InitializeCriticalSectionAndSpinCount
InterlockedExchange
LCMapStringW
LCMapStringA
GetModuleFileNameA
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetStartupInfoW
GetStdHandle
GetFileType
WriteConsoleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitThread
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
TlsSetValue
OutputDebugStringW
FindFirstFileW
SetEvent
CreateEventW
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
TerminateProcess
GetCurrentProcessId
CreateThread
GetLongPathNameW
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
CreateMutexW
GetDiskFreeSpaceExW
GetVolumePathNameW
GetDriveTypeW
WriteFile
Process32NextW
Process32FirstW
FlushInstructionCache
DeviceIoControl
SetFilePointer
CreateFileW
GetLastError
FindResourceExW
GetModuleFileNameW
LocalFree
DeleteFileW
MoveFileExW
SetFileAttributesW
GetTempPathW
InterlockedCompareExchange
GetVersionExW
GetSystemWindowsDirectoryW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
GetCurrentProcess
HeapAlloc
GetModuleHandleW
WaitForSingleObject
WideCharToMultiByte
TlsGetValue
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
lstrlenW
CreateFileA
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
GetProcAddress
LoadLibraryW
Sleep
CloseHandle
CreateProcessW
FreeLibrary
GetProcessHeap
HeapFree
HeapDestroy
GetSystemTimeAsFileTime
user32
SetWindowTextW
SendMessageW
GetWindowLongW
GetClientRect
GetWindowTextW
DrawTextW
EndPaint
SetWindowPos
InvalidateRect
FillRect
KillTimer
IsWindowEnabled
GetCapture
PtInRect
SetTimer
GetDC
LoadCursorW
UnregisterClassA
GetShellWindow
DefWindowProcW
FindWindowW
PostMessageW
ShowWindow
FindWindowExW
GetWindowRect
SetWindowLongW
IsWindow
CreateDialogParamW
SetRectEmpty
MsgWaitForMultipleObjects
SetWindowRgn
IsWindowVisible
UpdateLayeredWindow
ReleaseDC
CopyRect
GetDlgItemTextW
SetDlgItemTextW
GetWindowThreadProcessId
SetLayeredWindowAttributes
EndDialog
EnableWindow
MoveWindow
GetClassInfoExW
RegisterClassExW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
MessageBoxW
GetActiveWindow
BringWindowToTop
CallWindowProcW
GetWindowTextLengthW
CreateWindowExW
SystemParametersInfoW
SetCapture
ScreenToClient
DialogBoxParamW
DestroyWindow
RedrawWindow
GetCursorPos
IsIconic
PostQuitMessage
GetDlgItem
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
MapWindowPoints
IsDialogMessageW
BeginPaint
gdi32
CombineRgn
CreateRectRgn
CreateFontW
SetViewportOrgEx
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
DeleteDC
SetTextColor
SelectObject
SetBkMode
ExtTextOutW
SetBkColor
advapi32
GetTokenInformation
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
QueryServiceStatus
DeleteService
QueryServiceStatusEx
ControlService
OpenServiceW
RegQueryValueExA
CloseServiceHandle
OpenSCManagerW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DuplicateTokenEx
shell32
CommandLineToArgvW
SHGetSpecialFolderPathA
ord165
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHChangeNotify
SHGetSpecialFolderPathW
ole32
CoCreateGuid
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
oleaut32
VarUI4FromStr
SysAllocString
SysFreeString
VariantClear
SysStringByteLen
SysAllocStringByteLen
wininet
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
InternetOpenUrlW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCloseHandle
shlwapi
PathCombineW
StrCmpNIW
PathRemoveFileSpecW
SHGetValueA
PathFindFileNameW
PathIsPrefixW
StrStrIW
PathUnquoteSpacesW
PathCombineA
PathAppendA
PathFileExistsA
SHSetValueW
SHGetValueW
PathFileExistsW
PathAppendW
StrTrimA
PathMatchSpecW
AssocQueryStringW
StrCmpIW
StrStrIA
SHDeleteKeyW
PathIsRootW
PathIsRelativeW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
gdiplus
GdipCreateFromHDC
GdipDeleteGraphics
GdipLoadImageFromStream
GdipDrawImageRectRect
GdiplusStartup
GdipDrawImageRectRectI
GdipDrawImagePointRectI
GdipGetImageWidth
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipFree
GdipGetImageHeight
psapi
GetModuleFileNameExW
EnumProcessModules
GetProcessImageFileNameW
EnumProcesses
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
netapi32
Netbios
setupapi
SetupIterateCabinetW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 172KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE